Shop ebooks online Security - Readzis.co.uk
Readzis program recommandation
60 ebook(s)
Download this eBook Data Analytics for Cybersecurity
Add to my wish list

Data Analytics for Cybersecurity


Vandana P. Janeja


As the world becomes increasingly connected, it is also more exposed to a myriad of cyber threats. We need to use multiple types of tools and techniques to learn and understand the evolving threat landscape. Data is a common thread linking various types of devices and...

Publication date: 2022-07-21
Format: PDF
Add to basket
£68,40
Download this eBook 40 Years of Experience with the National Market System (NMS)
Add to my wish list

40 Years of Experience with the National Market System (NMS)


John Aidan Byrne , Robert A. Schwartz , Eileen Stempel


In 1975, the U.S. Securities Acts Amendments were enacted by Congress, which amongst other measures, officially mandated development of a National Market System (NMS). Since that time, the competitive map has been redrawn, technological changes have been huge and...

Publication date: 2022-06-30
Format: PDF, ePub
Publisher: Springer
Add to basket
£129,50
Download this eBook Anomaly Detection as a Service
Add to my wish list

Anomaly Detection as a Service


Long Cheng , Xiaokui Shu , Salvatore J. Stolfo , Danfeng (Daphne) Yao


Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider threats in enterprises, to anti-abuse detection for online social networks. Despite the...

Publication date: 2022-06-01
Format: PDF
Publisher: Springer
Add to basket
£49,99
Download this eBook Cyber-Physical Security and Privacy in the Electric Smart Grid
Add to my wish list

Cyber-Physical Security and Privacy in the Electric Smart Grid


Bruce Mcmillin , Thomas Roth


This book focuses on the combined cyber and physical security issues in advanced electric smart grids. Existing standards are compared with classical results and the security and privacy principles of current practice are illustrated. The book paints a way for future...

Publication date: 2022-06-01
Format: PDF
Publisher: Springer
Add to basket
£22,99
Download this eBook Auditing Corporate Surveillance Systems
Add to my wish list

Auditing Corporate Surveillance Systems


Isabel Wagner


News headlines about privacy invasions, discrimination, and biases discovered in the platforms of big technology companies are commonplace today, and big tech's reluctance to disclose how they operate counteracts ideals of transparency, openness, and accountability....

Publication date: 2022-03-31
Format: PDF
Add to basket
£72,00
Download this eBook Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
Add to my wish list

Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers


Mustafa Khairallah


This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large...

Publication date: 2021-11-17
Format: PDF, ePub
Publisher: Springer
Add to basket
£129,50
Download this eBook Excess Capacity and Difficulty of Exit
Add to my wish list

Excess Capacity and Difficulty of Exit


Sumio Saruyama , Peng Xu


This book provides cases and analyses of causes and consequences of difficulty in downsizing and exiting in the electronics industry during the “two lost decades” in Japan. Because of excess capacity in the industry, many electronics companies have been required for...

Publication date: 2021-09-16
Format: PDF, ePub
Publisher: Springer
Add to basket
£54,99
Download this eBook Technology Development for Security Practitioners
Add to my wish list

Technology Development for Security Practitioners


Babak Akhgar , Dimitrios Kavallieros , Evangelos Sdongos


This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security...

Publication date: 2021-06-24
Format: PDF, ePub
Publisher: Springer
Add to basket
£59,99
Download this eBook Exploring Malicious Hacker Communities
Add to my wish list

Exploring Malicious Hacker Communities


Collectif


Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online communication of these threat actors can help reduce the risk of attacks. This book shifts attention from the defender environment to the attacker environment, offering a new security...

Publication date: 2021-04-29
Format: PDF, ePub
Add to basket
£67,20
Download this eBook Device-Independent Quantum Information Processing
Add to my wish list

Device-Independent Quantum Information Processing


Rotem Arnon-Friedman


Device-independent quantum cryptography is a method for exchanging secret messages over potentially insecure quantum communication channels, such as optical fibers. In contrast to conventional quantum cryptography, security is guaranteed even if the devices used by the...

Publication date: 2020-10-31
Format: PDF, ePub
Publisher: Springer
Collection: Springer Theses
Add to basket
£139,50
Download this eBook Security, Privacy and User Interaction
Add to my wish list

Security, Privacy and User Interaction


Markus Jakobsson


This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails.This book goes on to explain, using a series of examples,  how to rethink security solutions to take users into consideration. By...

Publication date: 2020-10-27
Format: PDF, ePub
Publisher: Springer
Add to basket
£44,99
Download this eBook Cognitive Modeling for Automated Human Performance Evaluation at Scale
Add to my wish list

Cognitive Modeling for Automated Human Performance Evaluation at Scale


Shujun Li , Patrice Rusconi , Haiyue Yuan


Cognitive models and software tools have been widely used for both research and commercial purposes. Although they have proved very useful, there are some limitations preventing large-scale modeling and simulation tasks to be carried out efficiently and effectively. In...

Publication date: 2020-09-16
Format: PDF, ePub
Publisher: Springer
Add to basket
£54,99
Download this eBook The Coupling of Safety and Security
Add to my wish list

The Coupling of Safety and Security


Corinne Bieder , Kenneth Pettersen Gould


This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the methodological,...

Publication date: 2020-08-21
Format: PDF, ePub
Publisher: Springer
Add to basket
Free
Download this eBook Information Fusion in Distributed Sensor Networks with Byzantines
Add to my wish list

Information Fusion in Distributed Sensor Networks with Byzantines


Andrea Abrardo , Mauro Barni , Kassem Kallas , Benedetta Tondi


This book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective. For each of the settings considered, the equilibria of the game and...

Publication date: 2020-07-14
Format: PDF, ePub
Publisher: Springer
Add to basket
£109,50
Download this eBook Security Infrastructure Technology for Integrated Utilization of Big Data
Add to my wish list

Security Infrastructure Technology for Integrated Utilization of Big Data


Tomoaki Mimoto , Atsuko Miyaji


This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in...

Publication date: 2020-04-23
Format: PDF, ePub
Publisher: Springer
Add to basket
Free
Download this eBook 21st Century Prometheus
Add to my wish list

21st Century Prometheus


Maurizio Martellini , Ralf Trapp


This book describes the evolving CBRN risk landscape and highlights advances in the “core” CBRN technologies, including when combined with (improvised) explosive devices (CBRNe threats). It analyses how associated technologies create new safety and security risks,...

Publication date: 2020-03-11
Format: PDF, ePub
Publisher: Springer
Add to basket
£109,50
Download this eBook Handbook of Vascular Biometrics
Add to my wish list

Handbook of Vascular Biometrics


Christoph Busch , Sébastien Marcel , Andreas Uhl , Raymond Veldhuis


This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and...

Publication date: 2019-11-14
Format: PDF, ePub
Publisher: Springer
Add to basket
Free
Download this eBook The Art of War for Computer Security
Add to my wish list

The Art of War for Computer Security


Tom Madsen


In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks....

Publication date: 2019-09-03
Format: PDF, ePub
Publisher: Springer
Add to basket
£109,50
Download this eBook Advances in Human Factors in Cybersecurity
Add to my wish list

Advances in Human Factors in Cybersecurity


Tareq Ahram , Waldemar Karwowski


This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of...

Publication date: 2019-06-05
Format: PDF, ePub
Publisher: Springer
Add to basket
£129,50
Download this eBook Adversarial Machine Learning
Add to my wish list

Adversarial Machine Learning


Anthony D. Joseph , Blaine Nelson , Benjamin I. P. Rubinstein , J. D. Tygar


Written by leading researchers, this complete introduction brings together all the theory and tools needed for building robust machine learning in adversarial environments. Discover how machine learning systems can adapt when an adversary actively poisons data to...

Publication date: 2019-02-21
Format: PDF, ePub
Add to basket
£94,80
<< < 123 >

Sign up to get our latest ebook recommendations and special offers


Paiements sécurisés